1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mash [69]
3 years ago
13

Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that i

nfects PGP software and sits quietly inside Alice's computer. When Alice uses her private key to decrypt a message, the virus would wake up and make a note of it. The next time that Alice connects to the Internet, the virus would surreptitiously send the private key to Eve, thereby allowing her to decipher all subsequent messages sent to Alice. One way to better connect with this excerpt is to
Computers and Technology
1 answer:
antiseptic1488 [7]3 years ago
3 0

Answer:

Tell about an experience with a computer virus.

Explanation:

Simon Singh's "The Code Book," tells the history of how cryptography came into being and the secret messaging world of encryption. Through the detailed narration and diving into the history of encryption, the author traces the evolution of such a process and reveals how it has had a huge impact on the world's policies.

In the given excerpt, Singh gives an example of how viruses are planted and used to spy/ get access to other people's computers. But while it is possible to get the main point of the example, <u>it would have been better if the writer includes experience with a computer virus</u> so that readers will find it easier to connect with the given example. This will enable them to better understand the working of viruses and their effects.

Thus, the correct answer is the first option.

You might be interested in
Query " frosty the snowman
julsineya [31]
I don't think that is a query...
5 0
3 years ago
What is meant by ‘LASER’?
Zanzabum
Light Amplification by Stimulated Emission of Radiation
5 0
2 years ago
Read 2 more answers
On the basic of size, in how many groups do we classify the computers? Name them.<br>.​
Vedmedyk [2.9K]

Answer:

Computer can be classified into four categories based on size namely Micro, Mini, Mainframe and Super computer

Explanation:

8 0
3 years ago
Least common multiple of 78,90, and 140
Daniel [21]
The least common multiple (LCM) of 78, 90, and 140 is: 16,380

78 × 210 = 16,380
90 × 182 = 16,380
140 × 117 = 16,380
5 0
3 years ago
Read 2 more answers
Assume Flash Sort is being used on a array of integers with Amin = 51, Amax = 71, N=10, m=5 Items are classified according to th
Yuliya22 [10]

Answer:

3

Explanation:

= 1 + (int) (4*(63 - 51)/(71-51)))

= 1 + (int) (4*12/20)

= 1 + (int) (48/20)

= 1 + (int)2.4

= 1 + 2

= 3

8 0
2 years ago
Other questions:
  • Don't pat any attention to this
    7·2 answers
  • Which of the following could be defined as a general-purpose computing device that enables workers to create, manage, store, sea
    12·1 answer
  • Which increases the rate of soil formation?
    10·1 answer
  • What kind of printers tend to have problems with ink drying out inside the nozzles when the printer is not used for a period?
    15·1 answer
  • A ___describes a particular attribute of the dates item in a table​
    14·1 answer
  • What is a single-user computer?
    8·1 answer
  • What is a web client ​
    6·2 answers
  • Anyone know how to fix black screen of death on computer​
    6·1 answer
  • How many 60 KB jpeg files can be stored on a 2 MB folder in your hard drive?​
    7·1 answer
  • in ____ structures, the computer repeats particular statements a certain number of times depending on some condition(s).
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!